SecureExec
HomeAboutBlogPricing
Sign InSign Up

Built-in Detection Rules

21 production-ready rules that fire on real threats — tuned to minimize false positives with process context and allowlists. Source code available.

Ransomware

critical

Alerts on ransom note creation, file renames to encrypted extensions (LockBit, Akira, Cl0p, and 30+ others), mass file renaming, and backup wipe commands.

Read more →

Privilege Escalation to Root

high

Detects UID changes to root from non-root processes via setuid/setreuid syscalls, excluding known privilege-separation binaries such as sshd.

Read more →

Kernel Module Load

high

Alerts on kernel module loads by processes other than known module management tools (insmod, modprobe, kmod).

Reverse Shell

high

Catches shell processes (bash, sh, zsh, dash, ksh) making outbound network connections — the #1 post-exploitation technique.

Read more →

Fileless Execution (memfd_create)

high

Detects memfd_create usage — the primary vector for fileless malware that executes entirely from memory.

Read more →

Process Injection

high

Detects cross-process memory writes via process_vm_writev — used by injection tools to write shellcode into other processes.

Read more →

Sensitive File Tampering

high

Alerts on writes to /etc/passwd, /etc/shadow, /etc/hosts, /etc/ld.so.preload, and other files that adversaries modify to establish persistence or escalate privilege.

Read more →

Cron Persistence

high

Alerts on new cron job creation in /etc/cron.* and /var/spool/cron/ by non-system processes.

SSH Authorized Keys Tampering

high

Alerts on writes to any .ssh/authorized_keys file by processes other than ssh-copy-id.

Sudoers File Tampered

high

Detects writes to /etc/sudoers or /etc/sudoers.d/ by processes other than visudo.

Systemd Service Persistence

high

Alerts when a new .service unit file is created in /etc/systemd/system/ by unexpected processes.

SSH Success After Failures

high

Alerts on an SSH login success that follows 3+ failed attempts from the same IP within a 10-minute window.

LD_PRELOAD Injection

high

Detects processes launched with a non-empty LD_PRELOAD environment variable, a common technique for hooking system calls.

Container Namespace Escape

high

Flags suspicious unshare/setns calls with user, PID, or mount namespace flags from unexpected processes.

Read more →

Crypto Miner

high

Detects miner process names, stratum protocol patterns in command lines, mining pool ports, and known pool DNS queries.

Read more →

Auditd Disabled

medium

Detects commands that stop or disable auditd, a common attacker step to reduce detection coverage before proceeding.

SELinux Disabled

medium

Alerts on setenforce 0 or attempts to write permissive/disabled mode to /etc/selinux/config.

Suspicious Sudo Usage

medium

Flags sudo invocations used to set SUID bits, run chmod 777, or write to sensitive system paths.

Udev Rule Persistence

medium

Flags new or modified udev rules files written by processes other than udevadm or known package managers.

SSH Brute-Force

medium

Stateful detection of repeated SSH failures from the same source IP within a time window, with cooldown to prevent alert floods.

Read more →

Suspicious Outbound Connection

medium

Alerts when non-network processes make outbound connections to well-known service ports (22, 25, 53, 80, 443, 3306, 5432).

Want to see these rules fire on a real Linux host?

SecureExec

Lightweight endpoint security platform. Real-time visibility into process, file, and network activity across your entire fleet.

Product
  • Pricing
Company
  • About
  • Blog
  • Contact Sales
  • Support
Account
  • Sign In
  • Sign Up
Legal
  • Privacy Policy
  • Terms of Service

© 2026 SecureExec. All rights reserved.

Built with Rust & Next.js